August 2024: JSON Web Tokens for Science: Hands on Jupyter Notebook Tutorial Jeannette DopheideAugust 26, 2024
July 2024: Automated Building and Deploy Testing — Using Zeek as an example Jeannette DopheideJuly 22, 2024
June 2024: The Transformative Twelve: Taking a Practical, Evidence-Based Approach to Cybersecurity Controls Jeannette DopheideJune 21, 2024
May 2024: NSF's 2025 Research Infrastructure Guide: Information Assurance Jeannette DopheideMay 20, 2024
April 2024: SPHERE - Security and Privacy Heterogeneous Environment for Reproducible Experimentation Jeannette DopheideApril 9, 2024Comment
September 2023: Improving the Privacy and Security of Data for Wastewater-based Epidemiology Jeannette DopheideSeptember 13, 2023
August 2023: Leveraging Adaptive Framework for Open Source Data Access Solutions Jeannette DopheideAugust 28, 2023
July 2023: The Technical Landscape of Ransomware: Threat Models and Defense Models Jeannette DopheideJuly 17, 2023
June 2023: SecureMyResearch at Indiana University: Effective Cybersecurity for Research Jeannette DopheideJune 26, 2023
April 2023: Cybersecurity Operations for the NSF ACCESS Cyberinfrastructure Jeannette DopheideApril 24, 2023
February 2023: Using the Trusted CI Framework to Create the CFDE Cybersecurity Program Jeannette DopheideFebruary 27, 2023
January 2023: Improving the Security of Open-Source Software Infrastructure Jeannette DopheideFebruary 27, 2023
September 2022: Lowering the Barrier to Entry for Regulated Research Through Community Building Jeannette DopheideSeptember 26, 2022Comment